Shaarli export of all bookmarks on Tue, 12 Feb 19 08:13:58 -0500
- Terence Luk: Using InstallSoftwareRemotely.ps1 to upgrade VMware Horizon View Agent
- InstallSoftwareRemotely.ps1
- Document: Executive Order on Artificial Intelligence - Lawfare
- GDPR: Do your backups spark joy? | Data Protection: Avamar, NetWorker, Data Domain, RecoverPoint, CSM
- Veterans can access their medical info through Apple's Health Records
- Linked - New Research Reveals 6 Ways Leaders May Be Out of Touch With Their Employees
- Lawyers and Cybersecurity in 2019: Trends and Tips - MyCase Blog
- What Is Web Scraping? How to Collect Data From Websites
- Service Fabric Customer Architecture: ZEISS Group – AzureCAT Guidance
- SQL Mysteries: SQL Server Login Timeouts – A Debugging Story – SQL Server According to Bob
- Five lessons we learnt about GDPR in 2018 - Security Boulevard
- A Cybersecurity and Cloud Innovator – and a Great Partner - Security Boulevard
- 15 Hacker Types – The Good, the Bad and the Ugly
- Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features - Security Boulevard
- Ohio Senate Bill 220 Incentivizes Businesses to Maintain Higher Levels of Cybersecurity - Security Boulevard
- The Perfect Sales Kickoff - Security Boulevard
- How Panorays is Different Than Other Third-Party Risk Management Solutions - Security Boulevard
- Panorays
- The 3 Pillars of the Modern-Day SOC - Security Boulevard
- Customers Blame Companies not Hackers for Data Breaches - Security Boulevard
- Immunizing Your Healthcare Technology Against Cybersecurity Threats - Security Boulevard
- Simplifying Cybersecurity Deployments with Automation - Security Boulevard
- B 00 Doesnt It make You WannaCry Mitigating Ransomware on a Windows Network David Branscome - YouTube
- The Cybersecurity Skills Gap: The Defining Skills Shortage of Our Age - Security Boulevard
- Cloud security infographic: The Facts | Intercity Technology
- How to Monitor File Changes across Windows Servers - Security Boulevard
- Quick Hit: Speeding Up a Slow/Mundane Task with a Little Rcpp | rud.is
- EdGuards - Security for Education
- SSL Attacks, Part 2: Where Can Cybercriminals Access Digital Certificates? | Venafi
- SSL Attacks, Part 1: Why Do Cybercriminals Abuse Digital Certificates? | Venafi
- A Revolutionary Approach to HIPAA Compliance - Security Boulevard
- HIMSS 2019 – Champions of Security Unite – Professionally Evil Insights
- iOS 12.1.4 Patches Three Major Flaws | Avast - Security Boulevard
- Whiskey | Daniel Miessler
- To Understand IoT Security: Look to the Clouds - Security Boulevard
- nDPI - Open Source Deep Packet Inspection Software Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Microsoft will make Office Pro Plus GDPR compliant | Born's Tech and Windows World
- 'Grandmother Hypothesis' May Help Explain Why Women Live Past Menopause : Goats and Soda : NPR
- SQL Server Worker Thread Default Calculation – SQL Server According to Bob
- 7 Critical Job Application Mistakes to Avoid (Especially for New Graduates)
- The Best Portable Apps That Require No Installation
- Demystifying Stripe Width in vSAN — ThinkCharles.net
- Tips for writing Vester test files, part 1 | Adventures in a Virtual World
- OpenJDK projects you should know about: Valhalla
- SpeakUp Linux Backdoor targets Linux servers in East Asia and LATAM.Security Affairs
- Reverse RDP Attack - Rogue RDP Server can be used to hack RDP clientsSecurity Affairs
- Data breaches, GDPR lead 54% of companies to increase IT security spending - TechRepublic
- Business continuity in ISMS? - Security Art Work
- InfoSec Handlers Diary Blog - Struts Vulnerability CVE-2017-5638 on VMware vCenter - the Gift that Keeps on Giving
- InfoSec Handlers Diary Blog - UAC is not all that bad really
- Spy Versus Spy: How a Researcher And a Journalist Unmasked an Undercover Agent - Motherboard
- Michael on Security: March Updates on Frameworks & Standards
- Ransomware Victims Who Pay Cough Up $6,733 (on Average)
- Health Data Breach Tally: What’s New? - HealthcareInfoSecurity
- Susan Lucci
- Settlement Reached in Community Health Systems Breach Suit
- HIMSS19: Cybersecurity in the Spotlight - HealthcareInfoSecurity
- EHR Vendor Greenway Gets Hefty Fine for False Claims
- Bolstering the Cybersecurity of Medical Devices
- Chaitanya Srinivasamurthy
- Cottage Health Hit With $3 Million HIPAA Settlement
- Securities Fraud Claims Get Boost From EU Data Privacy Rules
- Let’s talk about IoT device security | NIST
- Wyoming Seeks to Repeal Hospital Privacy Regulation for HIPAA Clarity
- Fnord - Pattern Extractor For Obfuscated Code - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Bincat - Binary Code Static Analyser, With IDA Integration - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Small and Medium Business Security Strategies: Part 5 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 4 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 3 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 2 - Black Hills Information Security
- Small and Medium Business Security Strategies: Part 1 - Black Hills Information Security
- Investigate Suspicious Account Behaviour Using SysmonSearch - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Introducing WMIOps - Christopher Truncer's Website
- Make the Time to Fix Your Time Debt | Hackaday
- DSHR's Blog: Cloud For Preservation
- [career] Navigating Your Career | Don Jones®
- Digital Transformation Efforts Hindered by Lack of Collaboration Between IT and Business | APMdigest - Application Performance Management
- Essential System Tools: f3 - detect and fix counterfeit flash storage - LinuxLinks
- Docker - Basics just for me | itsec.siers.ch
- Reusing DHCP config in ISC dhcpd | Lesser-Evil
- Kubernetes - Namespaces - The IT Hollow
- Firing people is always a last resort. | The IT Skeptic
- AD Controls [SHIFT]
- Upgrade a Standalone ESXi Host to ESXi 6.7
- Taking the Azure Data Box Gateway (preview) out for a spin! – Karim Vaes
- 30 Things to Get You Started - Black Hills Information Security
- EyeWitness and Why It Rocks - Black Hills Information Security
- DFIRTrack - The Incident Response Tracking Application - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- GitHub - FortyNorthSecurity/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- Goscan - Interactive Network Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- RedELK - Easy Deployable Tool For Red Teams Used For Tracking And Alarming About Blue Team Activities As Well As Better Usability In Long Term Operations - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CANalyzat0r - Security Analysis Toolkit For Proprietary Car Protocols - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Volatility Workbench - A GUI For Volatility Memory Forensics - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Everything you need to know about DPOs under the GDPR - IT Governance Blog
- Bypass Application Whitelisting using Weak Path Rule
- The IT Governance Cyber Resilience Framework: how it works - IT Governance Blog
- Transform your security posture with cyber resilience - IT Governance Blog
- Google Online Security Blog: Open sourcing ClusterFuzz
- New Zombie 'POODLE' Attack Bred From TLS Flaw
- Mitigation upgrade to TLS v1.3
- Australian Parliament Reports Cyberattack on Its Computer Network - The New York Times
- Ransomware Attack Via MSP Locks Customers Out of ...
- Cyber risk management: The disconnect between business, security teams | CSO Online
- David A. Wheeler's Blog
- Certifications Are About Support | The Networking Nerd
- Cisco - Linux - Python: MainPage
- Design for security [LWN.net]
- Dstat - A Resourceful Tool to Monitor Linux Server Performance in Real-Time
- Ansible and FreeIPA Part 2 | Adam Young’s Web Log
- Ansible and FreeIPA Part-1 | Adam Young’s Web Log
- Containers: The Basics - Linux Academy Blog
- ZFS Boot Environments Are Helping To Improve The Resilience Of FreeBSD Upgrades - Phoronix
- Remote Desktop Protocol Riddled With 16 Major Vulnerabilities
- Microsoft and Open Source RDP Clients Are Vulnerable to System Takeover Attacks - WinBuzzer
- Top Hex Editors for Linux
- Disk Encryption for Low-End Hardware | Linux Journal
- A Moment of Truth for Cyber Insurance - Lawfare
- The Funniest Incident Postmortem | Gluster
- A review of all the calendar options in SharePoint and Office 365 - SharePoint Maven
- Successful Founders Share Their Advice for Starting Your Own Business
- Asylo
- 7 Tips For Communicating With the Board
- Report: Over 59,000 GDPR data breach notifications, but only 91 fines | CSO Online
- Open Source LIDAR Lets You Get Down To The Nitty Gritty | Hackaday
- NetLogo for scientific research: Modeling | Opensource.com
- Ubiquiti Discovery Service Exposures Allowing DoS Attacks Explained
- Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows
- Your Money or Your Life - An Interview with Author Vicki Robin | Mad Fientist
- Multiple Ways to Exploiting Windows PC using PowerShell Empire
- New Vulnerabilities Make RDP Risks Far From Remote
- Over 59K Data Breaches Reported in EU Under GDPR
- How to Access the Dark Web Safely and Anonymously
- Information Security | Daniel Miessler
- Ransomware Evolution: GandCrab v5.1 New Exploit Kit Distribution and TOR Site Features
- GandCrab v5.1
- How ADP identifies and reduces third-party risk | CSO Online
- Hard days at work - SysAdmin1138 Expounds
- Julia Reda – Article 13 is back on – and it got worse, not better
- Self-charging pacemakers are powered by patients' heartbeats
- ‘Achieving and Maintaining Cyberspace Superiority’: A Cyber Command and Interagency Legal Conference - Lawfare
- Password Reuse Remains a Barrier to Safer Internet Use, Google Reports
- 5 reasons why you need to embrace Microsoft Flow - SharePoint Maven
- Costs for Windows 7 Extended Security Updates till 2023 | Born's Tech and Windows World
- Windows 10: Microcode Updates February 2019 | Born's Tech and Windows World
- Planning for the future isn't what it used to be | Opensource.com
- UNIX: Building The Most Important OS in the World
- The Mayo Clinic created an online tool for predicting kidney stones
- Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process - Lawfare
- Big-O Notation Explained | Daniel Miessler
- Michael on Security: Security Maturity Models (Part 1 of 2)
- Avoid these Common Security Misconfigurations - Security Boulevard
- Building a Disk Tower, for all pain and no profit
- BestDuplicator
- Let's Play with Routing - Part 1
- A New Switch for a New Day
- Fwknop - Single Packet Authorization & Port Knocking - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The Mega-Guide to Trends in 2019 – J.D. Meier's Blog
- Parsing Text with PowerShell (3/3) | PowerShell Team Blog
- oVirt: Open Source Virtualization for the datacenter – Marksei
- What Is a VPN Connection and How Does It Work?
- Now That’s What I Call Crypto: 10 Years of The Best of Bitcoin | Hackaday
- Organize tool box drawers cheap - The Silicon Underground
- How bad is MS08-067? - The Silicon Underground
- MS08-067
- Linux Fu: Easier File Watching | Hackaday
- Hack Your File Hierarchy with Johnny Decimal System (Dewey’s Older Brother) | Hackaday
- The elements of cybersecurity hygiene and secure networks - Part 3
- CISOs must change their outlook or lose their jobs
- “AaronLocker” moved to GitHub – Aaron Margosis' Non-Admin, App-Compat and Sysinternals WebLog
- The case for building expertise to work on US AI policy, and how to do it - 80,000 Hours
- Out-of-Office Messages are a Security Risk - The Lone Sysadmin
- Monitoring Citrix - a vendor overview -
- Configure SCCM Maintenance Windows based on Patch Tuesday
- Automating my TV – Scott Gruby's Blog
- Adding Energy Monitoring to Home Assistant – Scott Gruby's Blog
- Hyper-V VM configuration version supported features - Thomas Maurer
- Cool feature in SMS Trace (Trace32.exe) | 9to5IT
- Thoughts on Azure, OMS & SCOM: Digging through log files? SMS Trace is the way to go!
- WSUS Windows Update Error 0x80244010: Exceeded max server round trips | Windows OS Hub
- 0x80244010
- Ubuntu 18.10 install notes | Nelson's log
- Running Systems » Blog Archive » HA ZFS NFS Storage
- Zero Day Initiative — Of ISOs and Attorneys: Legal Action in Vulnerability Disclosure
- Windows Incident Response: RegRipper
- Building a Cybersecurity Talent Pipeline One Coding Challenge at a Time | Webroot
- Compliance Beyond IRS 1075 and CJIS Audits - Blog | Tenable®
- IRS1075
CJIS
- Cyber (GRU) (II): historical SIGINT - Security Art Work
- Great reference list.
- Aztarna - the open-source scanning tool for vulnerable robotsSecurity Affairs
- Aztarna
- Reading the ENISA Threat Landscape Report 2018Security Affairs
- Can Enterprises execute a GRC Movement?Security Affairs
- Step 4. Set conditional access policies: top 10 actions to secure your environment - Microsoft Secure
- Debbie Seres
- CISO series: Talking cybersecurity with the board of directors - Microsoft Secure
- ADAPT - Tool That Performs Automated Penetration Testing For WebApps - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CIRTKit - Tools For The Computer Incident Response Team - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CIRTKit
- Uncle Spufus - A Tool That Automates Mac Address Spoofing - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Pown Recon - A Powerful Target Reconnaissance Framework Powered By Graph Theory - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- LOLBAS - Living Off The Land Binaries And Scripts (LOLBins And LOLScripts) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- LOLBAS
- List of data breaches and cyber attacks in January 2019 - 1,769,185,063 records leaked - IT Governance Blog
- A 6-step guide to surviving data breaches - IT Governance Blog
- Infosecurity.US - Web Log - OWASP Top Ten IoT 2018
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Privacy: Several States Consider New Laws - HealthcareInfoSecurity
- Inside Matrix and Emotet: How They Work, and How to Defend
- New Medical Device Cybersecurity Framework Unveiled
- Kevin McDonald
- Government Spending on Cybersecurity: An Analysis
- Alia Mendonsa
- A CISO on the Value of Endpoint Detection and Response
- Larry Whiteside
- Jenkins Pentest Lab Setup
- xDedic - Marketplace for Hacked RDP Credentials is Taken Down
- Vulnerability Life Cycle and Vulnerability Disclosures | Alexander V. Leonov
- What’s wrong with the Raspberry Pi – Own your bits
- Installing and setting-up JAVA & JBoss 7 Final on CentOS 6 | RoseHosting
- Hardening your HTTP response headers
- How to Mitigate the Java Deserialization Vulnerability in JBoss Application Servers | Synopsys
- The Bash Fingertips: Making Your Own 'Information Centre' | Tux Machines
- Java servers like Jetty, GlassFish and Tomcat | NGINX
- Using ngnix with WildFly - JBoss
- 5 Best Python Frameworks for WebView Testing | Codementor
- Build a network emulator using Libvirt | Open-Source Routing and Network Simulation
- How to Enable Android Enterprise and configure Personal devices with a Work Profile in Microsoft Intune – The ultimate Step-By-Step Guide
- How to Use Docker Containers - Make Tech Easier
- Cornelius' Blog: Governance on demand
- FOSS Project Spotlight: Mender.io, an Open-Source Over-the-Air Software Update Manager for IoT Devices | Linux Journal
- SSL and Weblogic - Remote PSAdmin
- Product Lifecycle Management in the Medical Device Industry - White Paper - lifecycle-mgmt-medical-device-bwp-070013.pdf
- UD_Cybersecurity-Healthcare-2018-conference-agenda.pdf
- Open redirects - the vulnerability class no one but attackers cares about - Steve Tabernacle
- Advisories | CERT NZ
- GitHub - Vulnerator/Vulnerator: The official distribution of the vulnerability parsing utility.
- Let’s Encrypt when your server is behind a firewall and you can’t use DNS Challenge – Diary of an Emacs tragic
- Should There Be More School Policies on Teachers' Social Media Interaction With Students? - Law and Daily Life
- Looking Ahead To 2019 | The Frog Pond of Technology
- How long will Oracle Database 12.2 be supported?
- Dissecting 190115 BP, PSU, RU and RUR - DBA - Rodrigo Jorge - Oracle Tips and Guides
- Azure Automation of A-to-Z, Part I – DBAKevlar
- A Collection of Useful Resources for Web Designers and Programmers
- Data Privacy Year | Linux Journal
- Using EFI/UEFI firmware in a VMware Virtual Mac... |VMware Communities
- Dump LAPS passwords with ldapsearch ·
- Searching LDAP using Nmap’s ldap-search.nse script | Faded Lab
- CA Spectrum Common Access Card Authentication Solution Guide - Spectrum_CAC_Authentication_Guide_ENU.pdf
- DoD CAC Reader | Ubuntu, Derivatives and Linux Mint – CubicleNate's Techpad
- Local Admin Access and Group Policy Don’t Mix - TrustedSec
- Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil …
- Centrify Now Offers Free US Government PIV and Military CAC Support for the Mac | Secure Thinking by Centrify
- CAC Card for DOD/Military : Fedora
- The Risky Business of Cybersecurity
- Connectivity Problems Caused by Issues in SQL Server – SQL Meditation
- Up, up and to the Clouds: Cloud Computing 101 - Security Boulevard
- Parsing Text with PowerShell (2/3) | PowerShell Team Blog
- Parsing Text with PowerShell (1/3) | PowerShell Team Blog
- Migrate a VM from vCenter to Azure | PeteNetLive
- Programming paradigms for dummies: what every programmer should know | the morning paper
- Top 30 Data Recovery Interview Questions and Answers for 2019
- Demystifying the Indian Data Protection Bill, 2018: Part 2 of 3 - Gemalto blog
- Demystifying the India Data Protection Bill, 2018: Part 1 of 3 - Gemalto blog
- New Phobos Ransomware Using Same Ransom Note as Dharma - Security Boulevard
- What Are Common Certificate Validation Flaws? - Security Boulevard
- CVSS: Characterizing and Scoring Vulnerabilities - Security Boulevard
- Benefits of SSH Key Management - Security Boulevard
- Open Source Licenses Explained - Security Boulevard
- The Evolution of Darknets - Security Boulevard
- Healthcare: A Cloud Security Investigation (CSI) - Security Boulevard
- CISO Intro by Jeremiah Grossman - Security Boulevard
- “Cyber Smart” Interview with Bart McDonough - Security Boulevard
- Continuous Monitoring 101
- How To Install and Use RetroArch on Linux - LinuxConfig.org
- Roles and Responsibilities of the Information Security Manager - Security Boulevard
- Windows Registry & Osquery: The Easy Way to Ensure Users are Secured - Security Boulevard
- Serverless And The Evolution In Cloud Security, How FaaS Differs From IaaS - Security Boulevard
- SAP Security Notes 2018: Lessons Learned and a Look to What's Ahead in 2019 - Security Boulevard
- FTW - Framework For Testing WAFs - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Build Cheat Sheets and Share Your Favourites! - Cheatography.com: Cheat Sheets For Every Occasion
- 10 YouTube URL Tricks You Should Know About
- Howto: Docker, Databases, and Dashboards to Deal with Your Data | Hackaday
- Container Jungle: where do I start? Docker, Kubernetes – Marksei
- Ansible, ARA and MariaDB (or MySQL) – The ongoing struggle
- Illinois biometric privacy law passes a key court test
- VIRTIO 1.1 Standard Moving Closer To Release With GPU Device, Better Performance - Phoronix
- DeployHappiness | Master of Science in IT: 1 Year, $5200
- Benchmarking The Current Spectre + Meltdown Performance Overhead For 10 GbE Networking - Phoronix
- Consumer threats down as cybercriminals target business
- Poor integration costs businesses $500,000 a year
- Chris's Wiki :: blog/linux/ServerRebootOnPanics
- Getting Started with Kubernetes - The IT Hollow
- Office 365 down (January 24, 2019)? | Born's Tech and Windows World
- Planner Notifications for Teams – All About I.T.
- Digital IDs said to boost economies, but privacy is at risk - Japan Today
- Prudent Security Admin: Has a New Data Breach Precedent Been Created? - Security Boulevard
- How to Become a Chief Information Security Officer — CyberSpeak Podcast - Security Boulevard
- Study: Hospitals dramatically increase ad spend following data breaches - Security Boulevard
- 5 Ways a CISO Can Tackle the CyberSecurity Skills Shortage Now - Security Boulevard
- 1. Lower the Skill Level
2. Spread the Load For Your Security Professionals
3. Raise Awareness About Cyber Attacks
4. Increase Network Visibility
5. Plan for Tomorrow
- NBlog - the NoticeBored blog: NBlog Jan 23 - infosec policies rarer than breaches
- NBlog - the NoticeBored blog: NBlog Jan 25 - cyber risks in context
- State agency exposes 3TB of data, including FBI info and remote logins – Naked Security
- 2 distinct campaigns delivered GandCrab ransomware and Ursnif TrojanSecurity Affairs
- Collection #1 Data Breach Analysis – Part 2 - by Marco RamilliSecurity Affairs
- “Collection #I” Data Breach Analysis – Part 1 – Marco Ramilli Web Corner
- Jok3R - Network And Web Pentest Framework - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Voice of the Customer: Azure AD helps lululemon enable productivity and security all at once for its employees - Microsoft Secure
- Conpot - An Open Industrial Control Honeypot - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Beebug - A Tool For Checking Exploitability - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Fighting Emotet: lessons from the front line – Naked Security
- The Application Security Team's Framework For Upgrading Legacy Applications
- Sh00T - A Testing Environment for Manual Security Testers - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- What is an ISMS and 8 reasons why you should implement one - IT Governance Blog
- The PCI SSC’s new software security standards – what you need to know - IT Governance Blog
- PCI SSC
- On the 'structural shortcomings' of the GDPR
- Study: Companies with GDPR investments conduct business faster
- Girl Scouts announce new cybersecurity patch
- 5 Malware Trends: Emotet Is Hot, Cryptominers Decline
- Hardware Hacking 101 – Lesson 1: Beauty, Your Home Lab and Basic Electronics - The Ethical Hacker Network
- Government Shutdown: Impact on Health Data Security, Privacy
- Colorado police encrypt *all* their radio communications, frustrating journalists
- Life Under GDPR: Data Breach Cost Unknown - HealthcareInfoSecurity
- Dharma Gang Pushes Phobos Crypto-Locking Ransomware
- Coveware's 2018 Q4 Ransomware Marketplace Report
- Google Hit With $57 Million GDPR Fine in France
- National Data Privacy Day Is Wishful Thinking
- Center for Internet Security releases Microsoft 365 benchmarks | CSO Online
- Looping sssd_nss - Blog dbi services
- VMware Snapshots: Securing Windows RDP Connections with a Signed SSL Certificate
- Landscaping a Secure/Closed Loop Infrastructure in Azure with Terraform & Azure Devops – Karim Vaes
- New – TLS Termination for Network Load Balancers | AWS News Blog
- Home - Freeplane - free mind mapping and knowledge management software
- Top 11 Free Linux DICOM Viewers for Doctors
- Understanding Bash fork() Bomb :(){ :|:& };: code - nixCraft
- GandCrab ransomware and Ursnif virus spreading via MS Word macros
- GandCrab
- Debian GNU/Linux 9.7 "Stretch" Released with Patched APT Package Manager
- Gulp - A Toolkit for Automating Painful Tasks in Development
- Top 5 Vulnerability Scanning Tools – Linux Hint
- Best 10 Free and Open Source Lab Management Systems
- Get started with LogicalDOC, an open source document management system | Opensource.com
- Beware! This Malicious Ransomware Hides As Free Games & Software
- Forget No-Carb. Embrace Slow Carb : The Salt : NPR
- Buddha Bowl - Make Your Own Bowl for any Phase - Chef Dawn Ludwig
- KookBook 0.2.0 available – now manage your cooking recipes better – Blog :: Sune Vuorela
- To upgrade or not to upgrade? That's the question! | The ORACLE-BASE Blog
- Vulnerabilities Found in Highly Popular Firmware for WiFi Chips
- New Android Malware Uses Motion Sensors To Stay Hidden
- The 7 Habits of Highly Effective IT Leaders – J.D. Meier's Blog
- Corporate Best Practices in Security Awareness and Training Programs
- Dan Lohrmann
- The Start of the RHCA Journey | Lisenet.com :: Linux | Security | Networking
- Guinness World Records bets on Office 365 and AWS to boost business expansion
- “It is the IT department’s job to make sure we can respond to the ever-growing changes within our business model, so we can take up new opportunities and move into new markets,” says Rob Howe, IT director at Guinness World Records.
- How to inject custom drivers into an ESXi 4.1 image using vibddi?
- An AnandTech Exclusive: The Jim Keller Interview
- SC Cyber
- 8 Awesome InfoSec and Cybersecurity Blogs of 2018 -
- GitHub - paralax/awesome-cybersecurity-internships: a list of cybersecurity internships
- GitHub - jivoi/awesome-ml-for-cybersecurity: Machine Learning for Cyber Security
- Greek Gluten Free Meatloaf Muffins | Healthy & Easy Freezer Meals
- nVisium
- xsstrike.tk
- GitHub - s0md3v/XSStrike: Most advanced XSS detection suite.
- GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
- GitHub - minimaxir/big-list-of-naughty-strings: The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
- Introducing Metta: Uber’s Open Source Tool for Adversarial Simulation
- Xeneta | Ocean Freight Rate Benchmarking Platform
- The State of AI for Sales Enablement, and the Evolution of the CRM | Emerj - Artificial Intelligence Research and Insight
- How To - Use VMware vSphere PowerCLI to patch hosts | 9to5IT
- How to Install latest ESXi VMware Patch - [Guide] | ESX Virtualization
- How to Write a Business Case ― 4 Steps to a Perfect Business Case Template | Workfront
- Security-related Rules
- New cybersecurity guidelines for medical devices | Vantage Asia
- How to Justify a Software Purchase — Step by Step
- SupplyChainBrain - The world's most comprehensive supply chain management information resource.
- Troubleshooting remote syslog reachability · Papertrail log management
- GitHub - trimstray/test-your-sysadmin-skills: A collection of *nix Sysadmin Test Questions and Answers. Test your knowledge and skills in different fields with these Q/A.
- Solaris : How to start syslogd in debug mode – The Geek Diary
- Topic: Cybersecurity - ABA Journal
- How To Centralize Logs with Rsyslog, Logstash, and Elasticsearch on Ubuntu 14.04 | DigitalOcean
- Centralised logging with Rsyslog and Microsoft Azure - Part 1
- x265 transcoding | Nelson's log
- So You Automated Your Coworkers Out of a Job
- OSINT Resources for 2019 – Steve Micallef – Medium
- A Review of my Bug Hunting Journey - My Learning Journey
- HOWTO: Build a Temperature Alert System using a Raspberry Pi – Please Work
- What version of SQL Server do I have? | Mohammed Wasay
- List Domain Admins & Enterprise Admins in a domain | Mohammed Wasay
- Get the list of domain admins and check if they are enabled.
Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
1
Get-ADGroupMember -Identity "Domain Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
Get the list of enterprise admins and check if they are enabled.
Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
1
Get-ADGroupMember -Identity "Enterprise Admins" -Recursive | %{Get-ADUser -Identity $_.distinguishedName} | Select Name, Enabled
- Create incremental OVA images using Packer
- Peter Gutmann's Home Page
- Peter Gutmann
- Blue Team Architecture and Analysis - Part 3, Coverage Assessment Map by J Geno - tool, knowledge, procedures
- Blue Team Architecture and Analysis - Part 2, Guide to the Part 1 Document by J Geno - engineering, management, data breaches
- Blue Team Architecture and Analysis - Part 1 by J Geno - time, business, goals
- PowerPoint Creating Conference Posters.pdf - Course_Book_Ppt_TIUD_Conference_Posters10.pdf
- All of Windows Cipher Suites | Mohammed Wasay
- Windows (10 & 2016) Build 1709 & 1803 cannot connect to SMB Shares | Mohammed Wasay
- Oracle to charge for Java Updates & how you can disable them | Mohammed Wasay
- Convert a Dynamic IP to Static | Mohammed Wasay
- Expedition ML4SEC Part - 1: Introduction to machine learning for security professionals - payatu
- Presentations: Billboard science : Naturejobs
- Turning your BMC into a revolving door - zeronights_2018_turning_your_bmc_into_a_revolving_door.pdf
- IoT Security – Part 4 (Bluetooth Low Energy - 101) - payatu
- IoT Security – Part 3 (101 - IoT Top Ten Vulnerabilities) - payatu
- Blog Archives - Page 3 of 4 - payatu
- IoT Security – Part 2 (101 - IoT Attack surface) - payatu
- IoT Security – Part 1 (101 - IoT Introduction and Architecture) - payatu
- RedTeaming from Zero to One - Part 2 - payatu
- RedTeaming from Zero to One - Part 1 - payatu
- Don’t Become a Ransomware Target
- Using Packer to Automate vSphere Template Builds
- Exploiting JNDI Injections in Java | Veracode blog
- vCloudNotes : Information Sharing: How to capture memory dump of a VM from snapshot or suspended state file
- Trusted Ransomware Removal And Data Recovery Experts
- Security Checklist
- North Korean hackers infiltrate Chile's ATM network after Skype job interview | ZDNet
- vCloudNotes : Information Sharing: Intel / AMD processor vulnerability: Meltdown-Spectre and VMware Esxi
- vCloudNotes : Information Sharing: How to reset iLO login password from within ESXi Shell
- Installing the Home Lab – Installing vCenter 5.5 on Windows 2012R2 – Everything-Virtual
- vCloudNotes : Information Sharing: How to Check, Start, Stop or Restart Windows version of vCenter 6.x Services
- HxD - Freeware Hex Editor and Disk Editor | mh-nexus
- Check with Powershell for Meltdown and Spectre #exploit critical vulnerabilities Protection #Meltdown #Spectre #KB4056892 | Robert Smit MVP Blog
- DevopsWiki/README.md at master · Leo-G/DevopsWiki · GitHub
- GitHub - ANSSI-FR/audit-radius: A RADIUS authentication server audit tool
- How to choose the correct Garbage Collector? Java Generational Heap and Garbage Collection explained - Karunsubramanian.com
- What you didn't know about java.lang.OutOfMemory Error! - Karunsubramanian.com
- Why is there a discrepancy between Windows Task manager Memory and Java Heap ? - Karunsubramanian.com
- Building vSphere Templates From Scratch Using Packer and the vSphere API – Green Reed Technology
- Windows 10 and reserved storage | Storage at Microsoft
- History · bibanon/bibanon Wiki · GitHub
- A huge list of Windows log file Event IDs for detecting lateral movement by S. Delano - development, python, script
- Detecting Lateral Movement through Tracking Event Logs
- Raspberrypi as poor man's hardware hacking tool - payatu
- Linux Security Hardening with OpenSCAP and Ansible – clasohm.com
- Splunk vs ELK - Karunsubramanian.com
- What is Docker? An absolute beginner's guide - Karunsubramanian.com
- Unable to Connect RDP: CredSSP Encryption Oracle Remediation | Windows OS Hub
- What is SYN_SENT socket status? - Karunsubramanian.com
- Windows XP Can’t RDP to Windows 10 / Server 2012R2/2016 RDS | Windows OS Hub
- Get Reverse-shell via Windows one-liner
- “Collection #1” Data Breach Analysis – Part 1 - Security AffairsSecurity Affairs
- How running websites has changed in the last two decades (for an Ars IT guru) | Ars Technica
- Fecebook Could Be Slapped With 'Record-Setting' Fine By FTC
- 7 Common Email Security Protocols Explained
- Facebook violated tough new cybersecurity law, says Vietnam – Naked Security
- DevOps and Culture, part 2 – Premier Developer
- DevOps and Culture, part 1 – Premier Developer
- UPnP, Vulnerability As A Feature That Just Won’t Die | Hackaday
- Serious Security: What 2000 years of cryptography can teach us – Naked Security
- Serverless computing: one step forward, two steps back | the morning paper
- The AI cybersecurity impact for IoT - Microsoft Secure
- Nine 2019 Cybersecurity PredictionsSecurity Affairs
- 6 Reasons We Need to Boost Cybersecurity Focus in 2019Security Affairs
- 4 ways to prepare for GDPR and similar privacy regulations - TechRepublic
- Chris's Wiki :: blog/linux/ZFSLicenseTwoViews
- Chris's Wiki :: blog/linux/CPUNumbersNotContiguous
- NFS. Not… Dead… Yet… - krypted.com
- Julia Reda – Designing the future of cybersecurity in Europe
- The challenges of adopting a consistent cybersecurity framework in the insurance industry - Microsoft Secure
- Guide to Developing a National Cybersecurity Strategy—a resource for policymakers to respond to cybersecurity challenges - Microsoft Secure
- RHEL 6 server receiving error mounting CIFS (Windows) share – mount error(112): Host is down | setaOffice
- Running Home Assistant in a Docker container with a Z-Wave USB stick · major.io
- All In with Home Assistant – Scott Gruby's Blog
- 2019 Cloud Predictions - Part 3 | APMdigest - Application Performance Management
- 2019 Cloud Predictions - Part 2 | APMdigest - Application Performance Management
- 2019 Cloud Predictions - Part 1 | APMdigest - Application Performance Management
- Virtual Machines do not boot after moving from Windows Server 2012 R2 to Windows Server 2019 - American Boffin
- Security in Windows Server 2019 - Security Art Work
- Data Security is a Global Economic Imperative - Blog | Tenable®
- Sitadel - Web Application Security Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Snyk - CLI And Build-Time Tool To Find & Fix Known Vulnerabilities In Open-Source Dependencies - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Snyk
- Shed - .NET Runtime Inspector - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Faraday v3.5 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- dnSpy - .NET Debugger And Assembly Editor - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Estimating SOC BudgetRafeeq Rehman – Personal Blog
- Robert Penz Blog » Howto install Bitwarden in a LXC container (e.g. Proxmox)
- The Evil-Twin Framework: A tool for improving WiFi security | Opensource.com
- Behind the Scenes & Under the Carpet – The CenturyLink Network that Powered AWS re:Invent 2018 | AWS News Blog
- Learn Windows PowerShell in a Month of Lunches, Third Edition #BookReview #Powershell #PowerCLI #Scripting #vExpert -
- Terence Luk: Citrix NetScaler CLI command cheat sheet
- Emotet Malware Returns to Work After Holiday Break
- Triton/Trisis Attack Was More Widespread Than ...
- 'We Want IoT Security Regulation,' Say 95% of IT ...
- The Rx for HIPAA Compliance in the Cloud
- PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
- PCI Secure Software Standard v1.0 - PCI-Secure-Software-Standard-v1_0.pdf
- 2018's Most Common Vulnerabilities Include Issues ...
- EU copyright laws face uncertain fate after 11 countries reject proposal
- Oracle 19c Released : How does that make you feel? | The ORACLE-BASE Blog
- GDPR Compliance and the Oracle E-Business Suite Revisited | Integrigy
- Winds of change? Winds of mediocrity.
- Vulnerabilities in building access system used by schools, governments | CSO Online
- Summary: The Dichotomy of Leadership | Daniel Miessler
- Kubernetes: List of ports Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- iPhone 11 Plus Wi-Fi 6 Equals Undefined? | The Networking Nerd
- iTWire - Cyber security threats will keep getting worse in 2019: claim
- Home Automation I | Zamir's Board
- CNC milling with open source software | Opensource.com
- Kubernetes security: 4 tips to manage risks | The Enterprisers Project
- Kali Linux 2018 for testing and maintaining Windows security - Wolf Halton and Bo Weaver [Interview] | Packt Hub
- How to Setup DRBD to Replicate Storage on Two CentOS 7 Servers
- Oracle Patches 284 Vulnerabilities in January Critical Patch Update
- AdoptOpenJDK - Open source, prebuilt OpenJDK binaries
- Thank You, John C. Bogle — My Money Blog
- Collection 1 data breach covers more than 772 million email addresses
- Cloud Computing TECHREPORT - 2018 ABA Survey Results | DennisKennedy.Blog
- Introduction to Ubuntu's LXD Containers - Make Tech Easier
- Chart: Stock Market Declines Are More Common Than You Think — My Money Blog
- Ryuk ransomware banks $3.7 million in five months
- Is GDPR Compliance Tougher Than HIPAA Compliance?
- Lessons From Report on Massive Singapore Healthcare Hack
- Government Shutdown: Experts Fear Deep Cybersecurity Impact
- Tom Kellermann
- Patch Tuesday, January 2019 Edition — Krebs on Security
- Ransomware Attacks: The Data Integrity Issues
- The 2019 Health Data Privacy Regulatory Outlook
- Cyber resilience and the GDPR - IT Governance Blog
- ITIL 4: What you need to know about the 2019 ITIL update - IT Governance Blog
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2) 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 2)
- SMB Penetration Testing (Port 445)
- Windows Applocker Policy - A Beginner’s Guide
- How To Change E1000 into VMXNET3 without changing a MAC address | ESX Virtualization
- From Encrypting the Web to Encrypting the Net: A Technical Deep Dive on Using Certbot to Secure your Mailserver | Electronic Frontier Foundation
- OpenMediaVault – Good Times With mdadm | PenguinPunk.net
- January 2019 patchday issues | Born's Tech and Windows World
- Humana Breaches Reflect Chronic Credential Theft in ...
- Who Takes Responsibility for Cyberattacks in the Cloud?
- What’s wrong with patch-based Vulnerability Management checks? | Alexander V. Leonov
- Blowing the Dust off of an IBM AS/400 Server | Hackaday
- Resolving Microsoft SQL Server Error 4064 with PowerShell – Mike F Robbins
- The Biggest Storage Trends of 2019 | Architecting IT
- What Makes IoT A Security Risk? | The Networking Nerd
- Configuring TACACS+ Server on Ubuntu 14.04LTS – Keeran's Blog
- CLOS Topology
- Firewall Ruleset Automation with CI Pipeline « ipSpace.net blog
- How to configure Windows 10 in Kiosk Single App, full-screen mode
- Just one more esxi-guy: The D.C.L.I. (Datacenter CLI)
- Stanford uploads 111 lectures by Donald Knuth. – Virtually Fun
- Taking a look at AutoDeploy in vSphere 6.5
- Tiger - The Unix Security Audit and Intrusion Detection Tool
- Tiger - The UNIX Security audit and intrusion detection tool
- How to Set Up a Local DNS Resolver on Ubuntu 18.04, 16.04 with BIND9 - LinuxBabe
- Am I financially independent? (And does it matter?)
- CVE Vulnerabilities: All You Ever Wanted to Know About
- Top Ways to Get ROI From Your AppSec Program - Security Boulevard
- Kubernetes: Master Post Carnal0wnage - Attack Research Blog Carnal0wnage & Attack Research Blog
- Top 5 things SMBs should consider when evaluating a cybersecurity strategy | Webroot
- All About the Hotspot Honeypots - Security Boulevard
- How to data breaches happen - Security Boulevard
- Sometimes A Vulnerability Isn’t So Vulnerable
- pfSense VLANs on Proxmox - Linux Included
- SSHGuard settings on pfSense - Linux Included
- Healthcare Continues to Be Prime Target for Cyber Attacks
- SlackPirate - The Slack Enumeration and Extraction Tool - emtunc's Blog
- Using Ansible to bring up a three node Patroni cluster in minutes - Blog dbi services
- GitHub - danluu/post-mortems: A collection of postmortems. Sorry for the delay in merging PRs!
- Reading postmortems
- Verizon FiOS – ICMP Traceroute Issues
- Too much disk IO on sda in RAID10 setup | blog.windfluechter.net
- How to be More Productive by Using the “Eisenhower Box”
- GDPR Myth #1: Fine of 4% of global turnover for your first GDPR offence | VinciWorks Blog
- Senators Demand Voting Machine Vendor Explain Why It Dismisses Researchers Prodding Its Devices
- Displaying IP Info on Console with Netplan – Fixing IT
- Julia Reda – In January, the EU starts running Bug Bounties on Free and Open Source Software
- TheHive Project – Open Source, Free and Scalable Cyber Threat Intelligence & Security Incident Response Solutions
- Tesla Model 3 known good accessories | TinkerTry IT @ Home
- PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Tesla Model 3 replacing my 13 year old Honda Civic Hybrid, let's see how that goes. So far, so good! | TinkerTry IT @ Home
- 7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions - Data Security Blog | Thales eSecurity
- Docker Security Tips & Best Practices – Threat Stack
- Healthcare IT Continues to Struggle with Backup Strategies - Security Boulevard
- 9 Benefits of ISO 27001 Certification (Some You Know, Some You Probably Don’t) | Pivot Point Security
- Cloud Hosting Provider DataResolution.net Battling Christmas Eve Ransomware Attack — Krebs on Security
- MISP - Malware Information Sharing Platform and Threat Sharing - The Open Source Threat Intelligence Platform
- The Docker Bench For Security - A Script That Checks For Dozens Of Common Best-Practices Around Deploying Docker Containers In Production - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSRFProbe - The Prime Cross Site Request Forgery Audit And Exploitation Toolkit - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 stages of cyber resilience - IT Governance Blog
- The End (of 2018) Is Near: Looking Back for Optimism
- New Year’s Resolution for 2019: Cybersecurity Must Be the Top Priority for the Board
- New cybersecurity rules take effect in South Carolina
- Health Industry Cybersecurity Practices: Managing Threats and Protecting Patients - HICP-Main-508.pdf
- Analyzing the Portuguese DPA's first GDPR fine
- Marriott Provides Update on Starwood Database Security Incident
- 25 Years Later: Looking Back at the First Great ...
- 2018 Health Data Breach Tally: An Analysis - HealthcareInfoSecurity
- Do not look for Cheap Black Friday Deal Testing - EvilTester.com
- The Difference Between Security and Privacy | Daniel Miessler
- Major US newspapers crippled by Ryuk ransomware attack | CSO Online
- Japan seeks cyberattacks to be in scope of security treaty with U.S. - Japan Today
- Why Automation Matters : Consistent Test Environments | The ORACLE-BASE Blog
- Easy PXE boot testing with only HTTP using iPXE and libvirt
- 10 ways to use OneNote for Project Management - SharePoint Maven
- Extend the evaluation period of Windows Server 2012/2016 and 2019 - ivobeerens.nl
- Recognizing Vendor Risks to National Security in the CFIUS Process - Lawfare
- How the Boston Children’s Hospital Is Innovating on Top of an Open Cloud
- 7 Nginx Rewrite Rule Examples with Reg-Ex and Flags
- The Developer Coefficient
- Yammer Seen Counts for Conversations – All About I.T.
- The two most important ways to defend against security threats | CSO Online
- Introduction to Cryptography Basic Principles
- weblogic - how to change listen port from default 7001 to something different? - Stack Overflow
- How to change the default port of weblogic (7001) (BEA/Weblogic forum at Coderanch)
- 10 Google Docs Tips That Take Seconds and Save You Time
- Launching Rational Cybersecurity for the Business | Security Architects Partners Dan Blum
- Erman Arslan's Oracle Blog: RDBMS -- TLS 1.2 support and issues ORA-29263: HTTP protocol error & ORA-29024: Certificate validation failure
- Erman Arslan's Oracle Blog: Oracle Seminar -- Oracle Technologies and Oracle Products + Oracle Job roles
- Erman Arslan's Oracle Blog: Exadata -- Exadata X3 reimaging problem -- biosbootorder
- Erman Arslan's Oracle Blog: Weblogic -- Performance problem - Forms & Reports environment -- Unable to load performance pack / libmuxer.so
- Change the Listen Port for Weblogic AdminServer #Oracle #IDM #Identity - TUMY | TECH
- Erman Arslan's Oracle Blog: Weblogic -- HACMP Configuration, IP Address Change
- The Finnish Hyperion Guy: Tidy Up WebLogic Server After EPM System Installation
- Vulnerability Management Part 1 I Pivot Point Security
- Yes: Your Law Firm Needs to Do a Business Impact Analysis | Pivot Point Security
- WebLogic AdminServer Port Conflict Remote Running on PC
- Java mon amour: Installing JIRA
- Java mon amour: Jboss CLI, change individual attributes of a security domain without having to remove and add the domain from scratch
- Java mon amour: java showSettings
- Default Port Numbers You Need to Know as an Administrator
- Why Tenable/NESSUS requires full level 15 access for Cisco devices? Don’t need it.
- Security/TLS Configurations - MozillaWiki
- Security/Server Side TLS - MozillaWiki
- Transport Layer Protection Cheat Sheet - OWASP
- Oracle – Got minus one from a read call – How to tackle? | {"code":"java"}
- Come Across: Presenting : Explore and Implement SharePoint Security: Permissions, Identities, and Objects @ NCS SharePoint CoP Group
- Security Update Guide
- CyGraph: Cybersecurity Situational Awareness That’s More Scalable, Flexible & Comprehensive - Neo4j Graph Database Platform
- TDS Endpoints: SQL Server's "Listener" | ColleenMorrow.com
- Private Investigator - Stillinger investigations
- How a U.S. Health Care System Uses 15-Minute Huddles to Keep 23 Hospitals Aligned
- Automotive Cybersecurity
- CDRH’s Medical Device Safety Action Plan – An Aspirational Blueprint for Addressing Medical Device Safety | Health Law | STAT
- Thora A. Johnson
- Active Directory® 101 - JumpCloud
- How to check if your processor supports Virtualization Technology on Ubuntu
- Chris's Wiki :: blog/linux/ZFSFileserverSameness
- Malwarebytes IT Security Predictions 2019 | Born's Tech and Windows World
- Serverless OpenLDAP™ - Security Boulevard
- The Best of Shape Security 2018 - Security Boulevard
- OPTPOLINES - Formerly Relpolines, Lower Overhead To Retpolines For Spectre Mitigation - Phoronix
- Local stratum-1 NTP server
- Ubiquiti Unifi setup
- Touchless health monitoring module works with Raspberry Pi
- Home - ROI-NJ
- MacOS Security Baseline Script – JerryGamblin.com
- Favorite Security Books Of 2018 – JerryGamblin.com
- Welcome to ServerlessSecurity.org! | ServerlessSecurity.org
- Host Websites On Github – JerryGamblin.com
- SQL Server 2014 Service Pack 3 is now Available!!! | SQL Server Release Services
- Adam Shostack's personal homepage
- The Hard Truth About G2A, Kinguin and Grey Market Keys – Locke's Journey
- Understanding the unique Israeli concept of Rosh Gadol (ראש גדול)-updated | Allon Shevat
- News – Joel on Software
- GitHub - cybermaggedon/cyberprobe: Capturing, analysing and responding to cyber attacks
- What Are Cipher Suites? - Security Boulevard
- Jacek Kowalczyk / my-debian · GitLab
- Looking Back at the Top Cyber-Securities Issues of 2018
- Cyber and Technology Resilience: Themes from cross-sector survey 2017 - 2018 - technology-cyber-resilience-questionnaire-cross-sector-report.pdf
- The Life of Kenneth: FCIX - State of the Exchange
- On Thinking About Infrastructure as Code - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- Hilbert’s list | Seth's Blog
- 1. High efficiency, sustainable method for growing sufficient food, including market-shifting replacements for animals as food
2. High efficiency, renewable energy sources and useful batteries (cost, weight, efficiency)
3. Effective approaches to human trafficking
4. Carbon sequestration at scale
5. Breakthrough form for democracy in a digital age
6. Scalable, profitable, sustainable methods for small-scale creators of intellectual property
7. Replacement for the University
8. Useful methods for enhancing, scaling or replacing primary education, particularly literacy
9. Beneficial man/machine interface (post Xerox Parc)
10. Cost efficient housing at scale
11. Useful response to urban congestion
12. Gene therapies for obesity, cancer and chronic degenerative diseases
13. Dramatic leaps of AI interactions with humans
14. Alternatives to paid labor for most humans
15. Successful interactions with intelligent species off Earth
16. Self-cloning of organs for replacement
17. Cultural and nation-state conflict resolution and de-escalation
18. Dramatically new artistic methods for expression
19. Useful enhancements to intellect and mind for individuals
20. Shift in approach to end-of-life suffering and solutions for pain
21. Enhanced peer-to-peer communication technologies approaching the feeling of telepathy
22. Transmutation of matter to different elements and structures
23. Off-planet outposts
It’s going to get interesting. Especially if we can imagine it.
- Cybersecurity and Insurance | Hackaday
- Patch Lady – vendors start to shut the doors on Windows 7 @ AskWoody
- Find Windows 10 Upgrade Blockers with PowerShell – smsagent
- FYI: End of Support for Windows 7, SQL-Server 2008 and more | Born's Tech and Windows World
- Effective Mental Models for Code and Systems – Cindy Sridharan – Medium
- The Art of Vacuum Tube Fabrication | Hackaday
- configuring_ssl_for_oracle_client_with_cac_using_mcs_3.pdf
- GitHub - pmdba/plsql-pii-scanner: An example of a method for scanning the Oracle data dictionary for potential PII data and automating specific responses, such as encrypting of columns or alerting the DBA, when new data is found.
- Finding And Fixing Node.js Memory Leaks: A Practical Guide | eknori.de
- Firejail - Securely Run Untrusted Applications in Linux
- I Hunt Sys Admins - The Intercept
- How China’s Elite APT10 Hackers Stole the World’s Secrets | WIRED
- How To Organize Your Income And Expenses
- How VMware Certifications changed my life -
- Getting started with chaos engineering | Opensource.com
- Chris's Wiki :: blog/linux/ZFSFileserverSetupIII
- Creating a useful spec | Seth's Blog
- NASA Astronomer Nancy Grace Roman, 'Mother' Of Hubble Space Telescope, Is Dead : NPR
- PostgreSQL-Diagnostic-Queries – DB-Tune
- Hackers Attack IPMI Default Passwords to Deploy Ransomware On Linux Servers - Latest Hacking News
- EU offers bounties to help find security flaws in open source tools
- Malware stalls delivery of LA Times and other major US newspapers
- Linux ip Command Examples - nixCraft
- Azure in the Government of Canada - Eric’s Azure Blog
- Penetration Testing on Group Policy Preferences
- From Encrypting the Web to Encrypting the Net: 2018 Year in Review | Electronic Frontier Foundation
- Side-Channel Vulnerability Variants 3a and 4 - Spectre and Meltdown - blackMORE Ops
- Building a PowerShell Process Memory Tool • The Lonely Administrator
- How to add network driver to Windows 10 PE | Marco Franssen
- Put your ssh experience in Windows on Steroids | Marco Franssen
- DSHR's Blog: Securing The Hardware Supply Chain
- Top 5 Cybersecurity Priorities for 2019: Ponemon Study - Blog | Tenable®
- Healthcare Data Breaches Associated with 64% Increase in Advertising Expenditures - Security Boulevard
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018
- Top 30 Chief Information Security Officer (CISO) Interview Questions and Answers for 2018 - Security Boulevard
- Healthcare Cybersecurity in 2019: The Time is Now - Security Boulevard
- Top 20 Most Popular Hacking Tools in 2018 - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Improving DNS logging, dnstap on Ubuntu - Koen Van Impe - vanimpe.eu
- Data Sanitization 5.3 release | OPSWAT
- The Year of the GDPR: 2018’s Most Famous Privacy Regulation in Review | Electronic Frontier Foundation
- Blog Exploits on the Rise | Onapsis
- Selenium IDE Tactical or Strategic? - Evil Tester - Technical Testing with Skill, Attitude and Pragmatism
- Looking Back: 2018 Project Report Card - Scott's Weblog - The weblog of an IT pro focusing on cloud computing, Kubernetes, Linux, containers, and networking
- An Internet Outage Could Kick In WannaCry Ransomware Again
- The elements of cybersecurity hygiene and secure networks -- Part 2
- The elements of cybersecurity hygiene and secure networks -- Part 1
- Cuckoo – Sandboxed Malware Analysis – ls /blog
- Chris's Wiki :: blog/sysadmin/MetricsAndUnderstandingMore
- The Best Maker YouTube Channels | Cool Tools
- Intel 5500 chipset heatsink tuning
- Smokeping – network latency monitor with Raspberry Pi – Alexander's Blog
- Context: Your Super-Weapon in Vulnerability Management? - Security Boulevard
- Industrial Control Systems Healthcheck | Mandiant | FireEye
- PCI Pal and Verizon White Paper Examines PCI Security Compliance in Contact Centre Environments - Security Boulevard
- Apache Struts Vulnerabilities vs Spring Vulnerabilities — One of these popular open source projects might be riskier than the other - Security Boulevard
- Defense in Depth: 4 Essential Layers of ICS Security
- AWS Lambda Security Quick-Start Guide
- Secure & Compliant Payment Solutions for Contact Centres | PCI Pal
- OWASP Top 10 Security Risks – Part II - Security Boulevard
- Software Monitoring for NERC CIP Compliance: Part 1
- Continuous Monitoring : Academic Paper - Security Boulevard
- OWASP Top 10 Vulnerabilities List — You’re Probably Using It Wrong
- A Brief Introduction to the OpenVAS Vulnerability Scanner
- Tis the Season to Check your SSL/TLS Cipher List Thrice (RCurl/curl/openssl) - Security Boulevard
- Cybersecurity is Increasingly Important for M&A Dealmakers - Security Boulevard
- PIPEDA & MDR: Breaches, Reporting and Advice
- Shared responsibility model: Who owns cloud security? - Security Boulevard
- RACI matrix in ISO 27001 implementation – How to use it?
- Negative Impact of Incorrect CSP Implementations - Security Boulevard
- Future Crimes by Marc Goodman (Book Summary) - Security Boulevard
- 37% of Ransomware Attacks Targeted Healthcare Organizations in Q3, Cyber Insurer Says - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Part 2 - Security Boulevard
- PIPEDA Best Practices Achieved with MDR - Security Boulevard
- Achieve CIS Compliance in Cloud, Container and DevOps Environments
- FreeRADIUS for MSPs - Security Boulevard
- Ten Ways Your Healthcare Org May Be Violating HIPAA - Security Boulevard
- 36 Best Business Books that Changed Microsoft Leaders’ Lives – J.D. Meier's Blog
- How I Became A Believer In Consuming IT Security As A Service - Security Boulevard
- 5 lessons public wi-fi can teach us about cybersecurity - Security Boulevard
- Apache Struts Vulnerabilities Burden Us With a ‘Stay or Go’ Deliberation - Security Boulevard
- A Little Guide to SMB Enumeration
- NHS is still assessing the cost of WannaCry one year laterSecurity Affairs
- CompTIA A+ Renewal Process - Security Boulevard
- Security Vulnerability in Internet-Connected Construction Cranes - Schneier on Security
- How to Enable HTTP/2 in Nginx
- Spectre mitigation guts Linux 4.20 performance – Naked Security
- InfoSec Handlers Diary Blog - Restricting PowerShell Capabilities with NetSh
- Pedagogic-cybersecurity-framework.pdf
- 6 years of Raspberry Pi in video | Opensource.com
- stoQ - An Open Source Framework For Enterprise Level Automated Analysis - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Keyfinder - A Tool For Finding And Analyzing Private (And Public) Key Files, Including Support For Android APK Files - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- 6 Ways to Anger Attackers on Your Network
- Reddit helps admin solve mystery of rogue Raspberry Pi – Naked Security
- Why a Helium Leak Disabled Every iPhone in a Medical Facility - Motherboard
- ꓘamerka — Build interactive map of cameras from Shodan
- Here's How Easy It Is to Make Your Own IMSI-Catcher
- Libvirt Fencing on a Physical KVM Host | Lisenet.com :: Linux | Security | Networking
- Yubico Security Key Review (The complete edition)
- SQLiScanner - Automatic SQL Injection With Charles And Sqlmap API - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Understanding the 7 different types of data breaches - Security Boulevard
- Voice of the Customer: The Walsh Group found that Azure Active Directory gives them a competitive edge - Security Boulevard
- Star WannaCry victim NHS to ban fax machines by 2020 - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- New NIST TLS Management Guidelines for InfoSec [Expert Advice] - Security Boulevard
- Notes on Build Hardening - Security Boulevard
- 5 Key Components Every Company Should Have in Their Privacy Policy - Security Boulevard
- The Top 5 Third-Party Cyber Gaps of 2018 - Security Boulevard
- Ahead of the Curve: University Incident Response Plans and Communications - Security Boulevard
- OWASP 'ServerlessGoat': A Vulnerable Demo Serverless Application - Security Boulevard
- The Year Ahead: Cybersecurity Trends To Look Out for In 2019 - Security Boulevard
- What’s the Problem with SMB 1, and Should You Worry About SMB 2 and 3? - Security Boulevard
- Why TLS 1.3 is a Huge Improvement - Security Boulevard
- Strategic Ways to Add Value to Your IT Consulting Business
- Beyond Scanning: Don’t Let AppSec Ignorance Become Negligence - Security Boulevard
- GUEST ESSAY: Top cybersecurity developments that can be expected to fully play out in 2019 - Security Boulevard
- Want Your R&D Team to Rock? 7 Tips to Help Your Developers Perform Like a Supergroup - Security Boulevard
- Top 30 Supervisory Control and Data Acquisition (SCADA) Technician Interview Questions and Answers for 2019 - Security Boulevard
- 3 Reasons Osquery Should Be On Every Incident Responders Christmas List - Security Boulevard
- Healthcare Cybersecurity in Intensive Care - Security Boulevard
- Flaws and Vulnerabilities and Exploits – Oh My! - Security Boulevard
- 5 tips to secure your supply chain from cyberattacks - TechRepublic
- We Asked 105 Experts What Worries Them Most About the Future - Motherboard
- testssl.sh - Testing TLS/SSL Encryption Anywhere On Any Port - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- XSStrike v3.0 - Most Advanced XSS Detection Suite - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Lynis 2.7.0 - Security Auditing Tool for Unix/Linux Systems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CAINE 10.0 - GNU/Linux Live Distribution For Digital Forensics Project, Windows Side Forensics And Incident Response - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- SpiderFoot - The Most Complete OSINT Collection And Reconnaissance Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- CRS - OWASP ModSecurity Core Rule Set - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Jackhammer - One Security Vulnerability Assessment/Management Tool To Solve All The Security Team Problems - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Celerystalk - An Asynchronous Enumeration and Vulnerability Scanner - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Faraday v3.4 - Collaborative Penetration Test and Vulnerability Management Platform - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- The 4 phases of a business continuity plan - IT Governance Blog
- List of data breaches and cyber attacks in November 2018 - 251,286,753 records leaked - IT Governance Blog
- How to create a business continuity plan – with free template - IT Governance Blog
- How to build a cyber incident response team - IT Governance Blog
- 7 of the most common cyber attacks you need to prepare for - IT Governance Blog
- Your checklist for responding to and reporting data breaches - IT Governance Blog
- 10 things you must do to become cyber secure - IT Governance Blog
- Your DPO questions answered in an interview with information security experts - IT Governance Blog
- Phishing, Ransomware Attacks Continue to Menace Healthcare
- Why NIST is so popular in Japan
- 7 CI/CD tools for sysadmins | Opensource.com
- Australia's new 'decryption' law and its effect on tech companies worldwide
- HOWTO: Calculate Elapsed Business Hours Using PowerShell – Please Work
- Network UPS Tools | Calvin Bui
- VMware vSphere Security - Getting Started Hands-on Lab
- People First – The Frequently Overlooked Importance of Culture Change in DevOps Journeys – Premier Developer
- Colorado Embraces New IT Security Philosophy
- Zero Trust part 1: Identity and access management - Microsoft Secure
- StarWind rPerf free tool • Nolabnoparty
- HTTP vs HTTPS – lakkireddymadhu
- How protected are you against cyber-attacks? – lakkireddymadhu
- All major browsers drop TLS 1.0 and 1.1 in 2020 – lakkireddymadhu
- How To Set Up Nginx with HTTP/2 Support on Ubuntu 16.04 | DigitalOcean
- HTTP/2 – lakkireddymadhu
- World Computer Security Day – lakkireddymadhu
- How to Find Hidden & Saved Passwords in Windows 10 – lakkireddymadhu
- How to Be Invisible Online (Without Going off the Grid) – lakkireddymadhu
- Visibility vs Results | The ORACLE-BASE Blog
- 10 Cybersecurity Myths – lakkireddymadhu
- Penetration Testing Techniques: Conducting effective recon for enhanced phishing (Office 365 edition) – David Vassallo's Blog
- Find email addresses in seconds • Hunter (Email Hunter)
- HTTP/3 – lakkireddymadhu
- HHS Deputy Secretary Eric Hargan Describes Cyber Initiative
- Analysis: Did Anthem’s Security ‘Certification’ Have Value?
- Health Data Breach Tally: Analyzing the Latest Trends
- Getting Started with Desired State Configuration Resources for VMware - VMware PowerCLI Blog - VMware Blogs
- Medical Devices: The Long Road to Security - HealthcareInfoSecurity
- 5 – 15s DNS lookups on Kubernetes? – Quentin
- Marriott: Data on 500 Million Guests Stolen in 4-Year Breach — Krebs on Security
- Installing metasploitable with vagrant
- What the Marriott Breach Says About Security — Krebs on Security
- HHS Seeks Feedback on Potential HIPAA Changes
- Incident Response: Why a Tabletop Exercise Is Essential
- SlithIR · trailofbits/slither Wiki · GitHub
- Slither – a Solidity static analysis framework | Trail of Bits Blog
- Cybersecurity Trends to Watch Out for in 2019 | Webroot
- Windows Incident Response: Veteran Skillz
- GDPR Compliance: The Role of Vendor Risk Management
- Does HIPAA Need to Be ‘Modernized’? - HealthcareInfoSecurity
- What is a VMware VIB file?
- How to Patch vCenter Server Appliance (VCSA) - [Guide] | ESX Virtualization
- I just setup WireGuard, and I’ll never go back to OpenVPN | Logan Marchione
- Windows Incident Response: Basic Skillz, pt II
- Windows Incident Response: Basic Skillz
- Though 2018 Will Likely Not Surpass 2017 Numbers – Still Significant Year For Breach Activity
- On Pace To Break 20k Mark For Disclosed Vulnerabilities
- Visualise Sysmon Logs and Detect Suspicious Device Behaviour -SysmonSearch- - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- Visualise Event Logs to Identify Compromised Accounts - LogonTracer - - JPCERT/CC Eyes | JPCERT Coordination Center official Blog
- What Is the OBD-II Port and What Is It Used For?
- 5 Cybersecurity Predictions for 2019
- Cyber Security Lessons from Abroad – Australia’s Essential Eight
- Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
- Multiple Ways To Exploiting HTTP Authentication
- ODA : Free up space on local filesystems - Blog dbi services
- 2018 in cybersecurity: Regrets, we have a few
- How To Install OpenLDAP Server for Centralized Authentication
- Listen to the radio at the Linux terminal | Opensource.com
- Web Proxy Penetration Lab Setup Testing using Squid
- Hack the Box: Jerry Walkthrough
- Comprehensive Guide on Dirbuster Tool
- HTTP Banner Grabbing Beyond The Root - DigiNinja
- Nessus Through SOCKS Through Meterpreter - DigiNinja
- Blog, Integrating GNS3 and VirtualBox - DigiNinja
- Wifi Honey - DigiNinja
- Multiple Ways to Exploit Tomcat Manager
- Thanos: long-term storage for your Prometheus Metrics on OpenShift – Red Hat OpenShift Blog
- FAIRCON Showcases Quantitative Risk Analysis on the Cusp of Adoption | Security Architects Partners
- How to Establish a Security Culture | Security Architects Partners
- Securezoo Articles
- Routes-apply.sh - Safely apply routes and revert on error | Sebastian Neef - 0day.work
- Is It Time to Start a PSIRT? Why Your CSIRT May Not Be Enough
- Here are the most common cyber security threats that occur in the healthcare sector
- 2018 in Cybersecurity Review: What Happened and What the Future Brings (Part 1)
- 7 Ways an Old Tool Still Teaches New Lessons About ...
- 9 Traits of A Strong Infosec Resume
- 7 Free (or Cheap) Ways to Increase Your ...
- 6 Python and containers videos worth watching | Opensource.com
- Patching the vCenter Server Appliance (VCSA) using the REST API
- Dream of augmented humans endures, despite skeptics - Japan Today
- How To Install IIS In Windows Server 2019 - RootUsers
- How To Enable Remote Desktop In Windows Server 2019 - RootUsers
- U.S. GAO - Information Security: Significant Progress Made, but CDC Needs to Take Further Action to Resolve Control Deficiencies and Improve Its Program
- DSHR's Blog: Securing The Software Supply Chain
- U.S. GAO - Federal Building Security: Actions Needed to Help Achieve Vision for Secure, Interoperable Physical Access Control
- U.S. GAO - Information Security: Agencies Need to Improve Implementation of Federal Approach to Securing Systems and Protecting against Intrusions
- SQL Server Linux: fsync and Buffered I/O – SQL Server According to Bob
- SQL Server On Linux: Forced Unit Access (Fua) Internals – SQL Server According to Bob
- How to become an AWS expert | AWS News Blog
- Serverless and startups, the beginning of a beautiful friendship | AWS News Blog
- ESXi 6.5.0 fails to boot with Error loading /a.b00 – Virtually Sober
- How to Enable TLS 1.3 in Nginx
- Security operations activities to watch in 2019 | CSO Online
- The Difference Between a Penetration Test and a Red Team Engagement | Daniel Miessler
- Automating a DevOps-Friendly Security Policy
- A Container Hacker’s Guide to Living Off of the Land – Professionally Evil Insights
- Measuring container security [LWN.net]
- Security Considerations for Container Runtimes - RHD Blog
- Deploying SQL Server on K8s with Helm charts
- Virtual Patching or Good Security Design instead?
- A checklist for overcoming life and career setbacks - 80,000 Hours
- A year's worth of education for under a dollar and other 'best buys' in development, from the UK aid agency's Chief Economist - 80,000 Hours
- Response: A Chief Security Concern for Executive Teams - EtherealMind
- Zen of Routing Protocols « ipSpace.net blog
- Red Hat Global Customer Tech Outlook 2019: Automation, cloud, & security lead funding priorities
- A Chief Security Concern for Executive Teams — Krebs on Security
- 5 Dedicated Server Security Vulnerabilities and How to Troubleshoot Them – ThisHosting.Rocks
- HardenedBSD 12 Released With Jailed Bhyve, Disables SMT By Default - Phoronix
- Closing the Global Cyber Enforcement Gap - Lawfare
- NASA discloses October security breach
- The US ballistic missile system is a cybersecurity nightmare
- Errata Security: Masscan as a lesson in TCP/IP